Pinned Repositories
atomic-red-team
Small and highly portable detection tests based on MITRE's ATT&CK.
attack-control-framework-mappings
Security control framework mappings to MITRE ATT&CK provide a critically important resource for organizations to assess their security control coverage against real-world threats and provide a bridge for integrating ATT&CK-based threat information into the risk management process.
attack-flow
Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flows for a small corpus of incidents, and creating visualization tools to display attack flows.
attack-workbench-frontend
An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository contains an Angular-based web application providing the user interface for the ATT&CK Workbench application.
cti-blueprints
CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable reports more consistently and efficiently.
neo4j-etl
Data import from relational databases to Neo4j.
Nimo-Awesome_repo
opcua-exploit-framework
Advanced OPC-UA framework for vulnerability research & exploitation
Taipan
Web application vulnerability scanner
threatsmanager
Threats Manager Platform Core libraries and SDK
squ1ddy's Repositories
squ1ddy/nomic
Interact, analyze and structure massive text, image, embedding, audio and video datasets
squ1ddy/pyLODE
An OWL ontology documentation tool using Python and templating, based on LODE
squ1ddy/graph_maker
squ1ddy/crewAI
Framework for orchestrating role-playing, autonomous AI agents. By fostering collaborative intelligence, CrewAI empowers agents to work together seamlessly, tackling complex tasks.
squ1ddy/Nimo-Awesome_repo
squ1ddy/mappings-explorer
Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogued in the MITRE ATT&CK® knowledge base. These mappings form a bridge between the threat-informed approach to cybersecurity and the traditional security controls perspective.
squ1ddy/amass
In-depth attack surface mapping and asset discovery
squ1ddy/genai-stack
Langchain + Docker + Neo4j + Ollama
squ1ddy/the-book-of-secret-knowledge
A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
squ1ddy/tram
TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE ATT&CK®.
squ1ddy/gpt-pilot
The first real AI developer
squ1ddy/crewAI-examples
squ1ddy/threatsmanager
Threats Manager Platform Core libraries and SDK
squ1ddy/control_freak
NIST SP 800-53, Security and Privacy Controls for Federal Information Systems and Organizations
squ1ddy/ism-oscal-asd
A mirror of ISM OSCAL documents. The authoritative source can be found at https://www.cyber.gov.au/ism/oscal.
squ1ddy/Azure-Design
My Azure stencil collection for Visio. Highly functional and always up to date.
squ1ddy/atomic-red-team
Small and highly portable detection tests based on MITRE's ATT&CK.
squ1ddy/VECTR
VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities across different attack scenarios
squ1ddy/attack-workbench-frontend
An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository contains an Angular-based web application providing the user interface for the ATT&CK Workbench application.
squ1ddy/top-attack-techniques
Top ATT&CK Techniques provides defenders with a systematic approach to prioritizing ATT&CK techniques.
squ1ddy/attack-flow
Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flows for a small corpus of incidents, and creating visualization tools to display attack flows.
squ1ddy/cyber-threat-profiling
A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense
squ1ddy/govready-deployments
Docker build of GovReady
squ1ddy/cti-blueprints
CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable reports more consistently and efficiently.
squ1ddy/collector
⚖Open Source Toolkit for Conducting Quantitative Risk Assessment Interviews
squ1ddy/CISControls_OSCAL
A repository containing OSCAL serializations of the CIS Critical Security Controls
squ1ddy/verinice-veo
verinice.veo is a cloud-native application for managing information security and data protection
squ1ddy/web-explorer
squ1ddy/opcua-exploit-framework
Advanced OPC-UA framework for vulnerability research & exploitation
squ1ddy/OdTM
OWASP Ontology-driven Threat Modelling framework